Exploit the possiblities

Ubuntu Security Notice USN-3430-2

Ubuntu Security Notice USN-3430-2
Posted Oct 3, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3430-2 - USN-3430-1 fixed several vulnerabilities in Dnsmasq. This update provides the corresponding update for Ubuntu 12.04 ESM. A Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher A discovered that Dnsmasq incorrectly handled DNS requests. A remote A attacker could use this issue to cause Dnsmasq to crash, resulting in A a denial of service, or possibly execute arbitrary code.A A Various other issues were also addressed.

tags | advisory, remote, denial of service, arbitrary, vulnerability
systems | linux, ubuntu
advisories | CVE-2017-14491, CVE-2017-14492, CVE-2017-14493, CVE-2017-14494, CVE-2017-14495, CVE-2017-14496
MD5 | 31ae3a8fa54f7d5ca3b4a9dbab5dc681

Ubuntu Security Notice USN-3430-2

Change Mirror Download
==========================================================================
Ubuntu Security Notice USN-3430-2
October 03, 2017

dnsmasq vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in Dnsmasq.

Software Description:
- dnsmasq: Small caching DNS proxy and DHCP/TFTP server

Details:

USN-3430-1 fixed several vulnerabilities in Dnsmasq. This update
provides the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

A Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
A discovered that Dnsmasq incorrectly handled DNS requests. A remote
A attacker could use this issue to cause Dnsmasq to crash, resulting in
A a denial of service, or possibly execute arbitrary code.A
A (CVE-2017-14491)

A Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
A discovered that Dnsmasq incorrectly handled IPv6 router
A advertisements. A remote attacker could use this issue to cause
A Dnsmasq to crash, resulting in a denial of service, or possibly
A execute arbitrary code. (CVE-2017-14492)

A Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
A discovered that Dnsmasq incorrectly handled DHCPv6 requests. A remote
A attacker could use this issue to cause Dnsmasq to crash, resulting in
A a denial of service, or possibly execute arbitrary code.A
A (CVE-2017-14493)

A Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
A discovered that Dnsmasq incorrectly handled DHCPv6 packets. A remote
A attacker could use this issue to possibly obtain sensitive memory
A contents. (CVE-2017-14494)

A Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
A discovered that Dnsmasq incorrectly handled DNS requests. A remote
A attacker could use this issue to cause Dnsmasq to consume memory,
A resulting in a denial of service. (CVE-2017-14495)

A Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
A discovered that Dnsmasq incorrectly handled DNS requests. A remote
A attacker could use this issue to cause Dnsmasq to crash, resulting in
A a denial of service. (CVE-2017-14496)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
A dnsmasqA A A A A A A A A A A A A A A A A A A A A A A A A 2.59-4ubuntu0.3
A dnsmasq-baseA A A A A A A A A A A A A A A A A A A A 2.59-4ubuntu0.3
A dnsmasq-utilsA A A A A A A A A A A A A A A A A A A 2.59-4ubuntu0.3

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
A https://www.ubuntu.com/usn/usn-3430-2
A https://www.ubuntu.com/usn/usn-3430-1
A CVE-2017-14491, CVE-2017-14492, CVE-2017-14493, CVE-2017-14494,
A CVE-2017-14495, CVE-2017-14496

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    12 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close